A Survey of Hardware Improvements to Secure Program Execution

L Zhao, H Shuang, S Xu, W Huang, R Cui… - ACM Computing …, 2024 - dl.acm.org
Hardware has been constantly augmented for security considerations since the advent of
computers. There is also a common perception among computer users that hardware does a …

Survey of research on confidential computing

D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …

[PDF][PDF] CAGE: Complementing Arm CCA with GPU Extensions

C Wang, F Zhang, Y Deng, K Leach… - Network and …, 2024 - ningzhenyu.github.io
Confidential computing is an emerging technique that provides users and third-party
developers with an isolated and transparent execution environment. To support this …

Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features

Y Zhang, Y Hu, H Li, W Shi, Z Ning, X Luo… - Proceedings of the 32nd …, 2023 - dl.acm.org
Failure diagnosis in practical systems is difficult, and the main obstacle is that the
information a developer has access to is limited. This information is usually not enough to …

Armor: Protecting Software Against Hardware Tracing Techniques

T Yue, F Zhang, Z Ning, P Wang, X Zhou… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Many modern processors have embedded hardware tracing techniques (eg, Intel Processor
Trace or ARM CoreSight). While these techniques are widely used due to their transparency …

GuaranTEE: Towards Attestable and Private ML with CCA

S Siby, S Abdollahi, M Maheri, M Kogias… - Proceedings of the 4th …, 2024 - dl.acm.org
Machine-learning (ML) models are increasingly being deployed on edge devices to provide
a variety of services. However, their deployment is accompanied by challenges in model …

ESem: To Harden Process Synchronization for Servers

Z Wang, J Zhan, X Ding, F Zhang, N Hu - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Process synchronization primitives lubricate server computing involving a group of
processes as they ensure those processes to properly coordinate their executions for a …

dTEE: A Declarative Approach to Secure IoT Applications Using TrustZone

T Sun, B Li, Y Teng, Y Gao… - 2024 23rd ACM/IEEE …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) applications have recently been widely used in safety-critical
scenarios. To prevent sensitive information leaks, IoT device vendors provide hardware …

2023 年网络空间安全科技热点回眸

冯登国, 连一峰 - 科技导报, 2024 - kjdb.org
2023 年, 美国, 欧洲, 澳大利亚, 日本, 韩国, 印度等国家或地区陆续发布网络空间安全国家政策和
战略计划. 与此同时, 以APT 攻击, 勒索攻击, 供应链攻击, 新型网络攻击, 移动端攻击为代表的高 …

[PDF][PDF] ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

S ShwetaShinde - 2023 - usenix.org
Trusted execution environments in several existing and upcoming CPUs demonstrate the
success of confidential computing, with the caveat that tenants cannot securely use …